Sciweavers

45 search results - page 9 / 9
» Preferential Reasoning on a Web of Trust
Sort
View
PVLDB
2010
120views more  PVLDB 2010»
13 years 3 months ago
Sampling the Repairs of Functional Dependency Violations under Hard Constraints
Violations of functional dependencies (FDs) are common in practice, often arising in the context of data integration or Web data extraction. Resolving these violations is known to...
George Beskales, Ihab F. Ilyas, Lukasz Golab
FLAIRS
2007
13 years 7 months ago
Explaining Task Processing in Cognitive Assistants that Learn
As personal assistant software matures and assumes more autonomous control of its users’ activities, it becomes more critical that this software can explain its task processing....
Deborah L. McGuinness, Alyssa Glass, Michael Wolve...
POPL
1998
ACM
13 years 9 months ago
A Type System for Java Bytecode Subroutines
Java is typically compiled into an intermediate language, JVML, that is interpreted by the Java Virtual Machine. Because mobile JVML code is not always trusted, a bytecode verifi...
Raymie Stata, Martín Abadi
AAAI
1997
13 years 6 months ago
PST: The Provider Selection Tool
Oxford Health Plans, Inc. is a managed care organization whose goal is to deliver cost-effective, high-quality health care. Oxford’s product lines include traditional health mai...
Howard Marmorstein, Jayesh Ghia, Sandeep Sathaye, ...
CORR
2010
Springer
157views Education» more  CORR 2010»
13 years 2 months ago
Using Semantic Wikis for Structured Argument in Medical Domain
This research applies ideas from argumentation theory in the context of semantic wikis, aiming to provide support for structured-large scale argumentation between human agents. The...
Adrian Groza, Radu Balaj